Privacy and Trust in Ambient Intelligent Environments
暂无分享,去创建一个
[1] Florian Schaub. Dynamic privacy adaptation in ubiquitous computing , 2014 .
[2] Michael Rovatsos,et al. Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..
[3] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Hector Garcia-Molina,et al. EigenRep: Reputation Management in P2P Networks , 2003 .
[5] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[6] Jorge Lobo,et al. Privacy-aware role-based access control , 2010 .
[7] Megan Tschannen-Moran,et al. A Multidisciplinary Analysis of the Nature, Meaning, and Measurement of Trust , 2000 .
[8] Marc Langheinrich,et al. Privacy in Ubiquitous Computing , 2014 .
[9] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[10] Michael Weber,et al. PriCal: context-adaptive privacy in ambient calendar displays , 2014, UbiComp.
[11] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[12] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[13] William A. Wallace,et al. Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[14] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[15] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[16] Sissela Bok,et al. Secrets: On the Ethics of Concealment and Revelation , 1982 .
[17] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[18] E. Gerck. Overview of Certification Systems: X.509, CA, PGP and SKIP , 1999 .
[19] James A. Landay,et al. Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.
[20] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[21] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[22] Nick Cercone,et al. A Bayesian Network Approach to Detecting Privacy Intrusion , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[23] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[24] B. Solhaug,et al. Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[25] Peter Langendörfer,et al. Enhancing Privacy by Applying Information Flow Modelling in Pervasive Systems , 2007, OTM Workshops.
[26] Norman L. Chervany,et al. Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.
[27] Sandra Steinbrecher. Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.
[28] Vladimiro Sassone,et al. Trust models in ubiquitous computing , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[29] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[30] Jeffrey S. Rosenschein,et al. Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.
[31] Jason I. Hong,et al. End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..
[32] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[33] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[34] Diana K. Smetters,et al. How users use access control , 2009, SOUPS.
[35] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[36] Peter Bodorik,et al. Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.
[37] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[38] Svetha Venkatesh,et al. Dynamic privacy assessment in a smart house environment using multimodal sensing , 2008, TOMCCAP.
[39] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[40] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[41] Jadwiga Indulska,et al. Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System , 2007, UIC.
[42] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[43] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[44] Jaijit Bhattacharya,et al. Utilizing Network Features for Privacy Violation Detection , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[45] P Pafko,et al. [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.
[46] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[47] Juan Carlos Augusto,et al. Learning patterns in ambient intelligence environments: a survey , 2010, Artificial Intelligence Review.
[48] N. Shahmehri,et al. An Integration of Reputation-based and Policy-based Trust Management , 2005 .
[49] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[50] Jorge Lobo,et al. Privacy-aware role based access control , 2009, SACMAT '07.
[51] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[52] Florian Schaub,et al. Territorial privacy in ubiquitous computing , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.
[53] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[54] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[55] Robert Ellis Smith,et al. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .
[56] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[57] Rino Falcone,et al. Trust Theory: A Socio-Cognitive and Computational Model , 2010 .
[58] Javier Carbó,et al. TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .
[59] Diane J. Cook,et al. Author's Personal Copy Pervasive and Mobile Computing Ambient Intelligence: Technologies, Applications, and Opportunities , 2022 .
[60] Ketil Stølen,et al. Evolution in Relation to Risk and Trust Management , 2010, Computer.
[61] Marco Gruteser,et al. USENIX Association , 1992 .
[62] Michael Weber,et al. Towards Territorial Privacy in Smart Environments , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.
[63] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[64] Carles Sierra,et al. An information-based model for trust , 2005, AAMAS '05.